咨询与建议

限定检索结果

文献类型

  • 108,400 篇 会议
  • 15,727 册 图书
  • 11,121 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 135,109 篇 电子文献
  • 170 种 纸本馆藏

日期分布

学科分类号

  • 107,605 篇 工学
    • 93,057 篇 计算机科学与技术...
    • 66,619 篇 软件工程
    • 23,096 篇 信息与通信工程
    • 12,539 篇 电气工程
    • 8,337 篇 控制科学与工程
    • 8,184 篇 生物工程
    • 8,077 篇 生物医学工程(可授...
    • 6,286 篇 光学工程
    • 4,393 篇 电子科学与技术(可...
    • 3,853 篇 机械工程
    • 3,609 篇 化学工程与技术
    • 2,781 篇 建筑学
    • 2,343 篇 动力工程及工程热...
    • 2,310 篇 土木工程
    • 2,012 篇 安全科学与工程
  • 55,651 篇 理学
    • 41,048 篇 数学
    • 9,539 篇 生物学
    • 8,447 篇 物理学
    • 7,806 篇 统计学(可授理学、...
    • 4,825 篇 系统科学
    • 3,126 篇 化学
  • 22,326 篇 管理学
    • 13,183 篇 图书情报与档案管...
    • 10,141 篇 管理科学与工程(可...
    • 6,929 篇 工商管理
  • 5,722 篇 医学
    • 5,266 篇 临床医学
    • 4,540 篇 基础医学(可授医学...
    • 3,132 篇 药学(可授医学、理...
  • 3,695 篇 法学
    • 3,129 篇 社会学
  • 2,458 篇 教育学
    • 2,416 篇 教育学
  • 2,158 篇 经济学
    • 2,152 篇 应用经济学
  • 1,824 篇 农学
  • 171 篇 军事学
  • 107 篇 文学
  • 74 篇 艺术学
  • 17 篇 哲学
  • 2 篇 历史学

主题

  • 8,057 篇 artificial intel...
  • 4,840 篇 computer communi...
  • 3,516 篇 information syst...
  • 2,779 篇 algorithm analys...
  • 2,432 篇 software enginee...
  • 2,006 篇 image processing...
  • 1,992 篇 user interfaces ...
  • 1,973 篇 semantics
  • 1,939 篇 computers
  • 1,925 篇 information stor...
  • 1,665 篇 computer applica...
  • 1,526 篇 pattern recognit...
  • 1,469 篇 data mining and ...
  • 1,433 篇 computer vision
  • 1,426 篇 software enginee...
  • 1,371 篇 database managem...
  • 1,251 篇 distributed comp...
  • 1,225 篇 theory of comput...
  • 1,216 篇 computer circuit...
  • 1,181 篇 computer systems...

机构

  • 202 篇 university of sc...
  • 152 篇 huazhong univers...
  • 151 篇 department of co...
  • 145 篇 institute of inf...
  • 121 篇 department of co...
  • 120 篇 tsinghua univers...
  • 116 篇 shanghai jiao to...
  • 112 篇 national institu...
  • 96 篇 school of comput...
  • 93 篇 chinese academy ...
  • 85 篇 école des ponts ...
  • 83 篇 department of co...
  • 81 篇 university of el...
  • 73 篇 karnataka bangal...
  • 72 篇 department of co...
  • 71 篇 college of compu...
  • 68 篇 school of comput...
  • 67 篇 university of ch...
  • 63 篇 school of comput...
  • 63 篇 college of compu...

作者

  • 73 篇 vardi moshe y.
  • 70 篇 wang lei
  • 60 篇 zhang lei
  • 59 篇 pnueli amir
  • 47 篇 hancock edwin r.
  • 41 篇 huang yueh-min
  • 40 篇 li xin
  • 40 篇 marina l. gavril...
  • 38 篇 man ka lok
  • 37 篇 jiang xiaoyi
  • 37 篇 li yang
  • 36 篇 stuckey peter j.
  • 35 篇 zhang tao
  • 34 篇 yu yong
  • 34 篇 liu bo
  • 33 篇 panayiotis zaphi...
  • 33 篇 jianying zhou
  • 32 篇 peleg david
  • 31 篇 hsu tsan-sheng
  • 31 篇 lee dong chun

语言

  • 127,590 篇 英文
  • 5,876 篇 其他
  • 1,495 篇 中文
  • 284 篇 德文
  • 4 篇 法文
  • 1 篇 加泰罗尼亚文
  • 1 篇 俄文
检索条件"任意字段=Lecture Notes in Computer Science"
135251 条 记 录,以下是4621-4630 订阅
排序:
Designing a Multi-user VR Social Activity Space for Social Interaction for People Living with Dementia  9th
Designing a Multi-user VR Social Activity Space for Social I...
收藏 引用
9th Joint International Conference on Serious Games, JCSG 2023
作者: Reilly, G. Redfern, S. Muntean, G.-M. Brennan, A. School of Computer Science University of Galway Galway Ireland School of Electronic Engineering Dublin City University Dublin 9 Ireland
Dementia is a condition that leads to a gradual decline in executive cognitive functioning over time. Health care professionals use non-pharmacological activities to enrich the lives of people living with dementia (PL... 详细信息
来源: 评论
Tracking and Tracing Containers Model Enabled Blockchain Basing on IOT Layers  1
收藏 引用
8th International Conference on Smart City Applications, SCA 2023
作者: Nasih, Safia Arezki, Sara Gadi, Taoufiq Faculty of Sciences and Techniques Mathematics Computer Science andEngineering Laboratory Hassan First University of Settat Settat26000 Morocco
Smart transportation nowadays is based on tracking vessels, assets, etc.. Tracking and tracing operation is an important services that can enhance the maritime trade around the world, minimize loss and increase gain i... 详细信息
来源: 评论
Monitoring Pollination by Honeybee Using computer Vision  14th
Monitoring Pollination by Honeybee Using Computer Vision
收藏 引用
14th International Conference on Intelligent Human computer Interaction, IHCI 2022
作者: Kujur, Vinit Bedi, Anterpreet Kaur Saini, Mukesh Indian Institute of Technology Ropar Rupnagar India Thapar Institute of Engineering and Technology Patiala India
Honey bees are critical in pollination worldwide and are essential for crop productivity and ecological management. Knowing more about honeybees and their interaction with plants is urgently needed given the current g... 详细信息
来源: 评论
Co-clustering Based Methods and Their Significance for Recommender Systems  16th
Co-clustering Based Methods and Their Significance for Recom...
收藏 引用
16th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2023
作者: Kumar, Naresh Sheeba, Merlin CSE Department Sathyabama Institute of Science and Technology Chennai India Department of ECE Jerusalem College of Engineering Chennai India
In the contemporary era, businesses are driven by Internet based web or mobile applications. In every conceivable area of research, it is indispensable for such applications to have a recommender system to expedite th... 详细信息
来源: 评论
A Security Framework for the Detection of Targeted Attacks Using Honeypot  1
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Subhash, P. Qayyum, Mohammed Likhitha Varsha, C. Mehernadh, K. Sruthi, J. Nithin, A. and AI&DS VNR VJIET Pragathi Nagar Telangana Hyderabad500090 India Computer Science Engineering King Khalid University Abha62529 Saudi Arabia
The reliance on the Internet is growing steadily day by day, making susceptible to various security risks such as code injection, session hijacking, Denial-of-Service attacks, etc. These attacks threaten the CIA triad... 详细信息
来源: 评论
Exploiting Memory-Aware Q-Distribution Prediction for Nuclear Fusion via Modern Hopfield Network  1
收藏 引用
14th International Conference on Brain Inspired Cognitive Systems, BICS 2024
作者: Ma, Qingchuan Wang, Shiao Zheng, Tong Dai, Xiaodong Wang, Yifeng Yang, Qingquan Wang, Xiao School of Computer Science and Technology Anhui University Hefei China Institute of Plasma Physics Chinese Academy of Sciences Hefei China
This study addresses the critical challenge of predicting the Q-distribution in long-term stable nuclear fusion task, a key component for advancing clean energy solutions. We introduce an innovative deep learning fram... 详细信息
来源: 评论
A Blockchain-Based Mobile Payment System for Secure Transaction  1
收藏 引用
7th International Conference on Intelligent Computing and Optimization, ICO 2023
作者: Zareef, Zuhair Ishraq Das, Shuvo Kumar Mobasshir, Tanvir Maisha, Nusrat Reza, Ahmed Wasif Islam, Khandaker Shahidul Department of Computer Science and Engineering East West University Dhaka Bangladesh CSG International Pty Limited Canberra Australia
Blockchain technology has emerged as a solution to the bank's problem, acting as a middleman in traditional and online banking systems. It enables peer-to-peer transactions and protects people's financial info... 详细信息
来源: 评论
Towards Norm Entrepreneurship in Agent Societies  21st
Towards Norm Entrepreneurship in Agent Societies
收藏 引用
21st International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2023
作者: Anavankot, Amritha Menon Cranefield, Stephen Savarimuthu, Bastin Tony Roy Department of Information Science University of Otago Dunedin New Zealand
One of the principal focuses of normative multi-agent systems in a distributed environment is coordination among agents. Most work in this area has studied norms that are provided to agents as part of their specificat... 详细信息
来源: 评论
H4VDM: H.264 Video Device Matching  1
收藏 引用
26th International Conference on Pattern Recognition, ICPR 2022
作者: Xiang, Ziyue Bestagini, Paolo Tubaro, Stefano Delp, Edward J. School of Electrical and Computer Engineering Purdue University West LafayetteIN United States Dipartimento di Elettronica Informazione e Bioingegneria Politecnico di Milano Milan Italy
Methods that can determine if two given video sequences are captured by the same device (e.g., mobile telephone or digital camera) can be used in many forensics tasks. In this paper we refer to this as "video dev... 详细信息
来源: 评论
Lasso and Ridge for GARCH-X Models  10th
Lasso and Ridge for GARCH-X Models
收藏 引用
10th International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making, IUKM 2023
作者: Yamaka, Woraphon Maneejuk, Paravee Thongkairat, Sukrit Center of Excellence in Econometrics Faculty of Economics Chiang Mai University Chiang Mai50200 Thailand Department of Statistics Faculty of Science Chiang Mai University Chiang Mai50200 Thailand
This paper examines the efficacy of the least absolute shrinkage and selection operator (Lasso) and Ridge algorithms in improving the volatility forecasting of the Generalized Autoregressive Conditional Heteroskedasti... 详细信息
来源: 评论